Solved

Protecting branch office VPN's...

Posted on 2004-08-30
6
438 Views
Last Modified: 2013-11-16
I am going to create a connection between our HQ and a branch office, I have done this in the past no problem. My question is, what can I do to stop any virus activity from flowing back over the VPN to HQ or vice-versa. All the machines have managed anti-virus and patch protection, I am throwing this senario out as a "what if". Anyways, is there a VPN product that does packet inspection of the VPN tunnels itself? I was going with sonicwall products, as cisco is too complex for our needs at this time. Any ideas?

Thanks in advance!
0
Comment
Question by:cbtech
6 Comments
 
LVL 1

Expert Comment

by:Robnhood
ID: 11935057
The only thing that I have heard of that would allow you to do something like this is the cisco security agent.
0
 
LVL 3

Expert Comment

by:CvD
ID: 11936494
Well, I'm no expert, but Googleing "packet inspection of VPN tunnel" got me a ton of info on the subject. Seems there are lots of products (router/firewalls) available now that support this.

Vaya con Dios,
CvD
0
 
LVL 5

Accepted Solution

by:
rsriprac earned 125 total points
ID: 11939872
I would think block out all ports (IPsec) that are not in use on the ends before it is tunneled.  This will provide some layer of protection.  Other then that try:

http://www.fortinet.com/products/

-Ram
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Expert Comment

by:nadeem_azhar
ID: 11948604
Look at the SnapGear line of products from CyberGuard.  Real easy to configure and no user limits.   http://www.snapgear.com
Configuring L2TP/IPSEC/PPTP VPN and IPSEC tunnel is a snap.

Regards
0
 
LVL 3

Expert Comment

by:CvD
ID: 11949671
Looking at the comments sofar, go for my solution and decide for yourself.
0
 
LVL 2

Expert Comment

by:mellowmarquis
ID: 11950143
There's a cool appliance called a Packetshaper which allows you to prioritise or drop taffic. It can see through IPSec and VPN's and even prioritise applications within Citrix sessions. It's very cool.

I also find it useful for giving a real-time status of traffic flow and have used it to monitor links to 200 sites by routing all traffic through our co-lo. I prefer to allow traffic to flow so that I can see whats on the wire. As soon as I spot ICMP or some known worm port getting hit, I can turn on monitoring to read which terminals it's coming from and determine exactly which site it's coming from. I'd prefer to get rid of any infections rather than contain them and let them continue to infect vulnerable clients/laptops on the local network.

Check it out:
http://www.packeteer.com/prod-sol/products/packetshaper.cfm

I've never been one to publicly endorse products, but this is a really cool box (and their tech support is very good compared to some)

0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

OnPage: Incident management and secure messaging on your smartphone
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question